Home > SMC Networks > Router > SMC Networks Router SMCWBR14-N User Manual

SMC Networks Router SMCWBR14-N User Manual

    Download as PDF Print this page Share this page

    Have a look at the manual SMC Networks Router SMCWBR14-N User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 10 SMC Networks manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    							88 
    A way of sending data through light impulses over glass or plastic wire or fiber   
    File server   
    A computer on a network that stores data so that the other computers on the network can all 
    access it   
    File sharing   
    Allowing data from computers on a network to be accessed by other computers on the network 
    with different levels of access rights   
    Firewall  
    A device that protects resources of the Local Area Network from unauthorized users outside of 
    the local network   
    Firmware  
    Programming that is inserted into a hardware device that tells it how to function   
    Fragmentation  
    Breaking up data into smaller pieces to make it easier to store   
    FTP  
    File Transfer Protocol. Easiest way to transfer files between computers on the Internet   
    Full-duplex  
    Sending and Receiving data at the same time   
    G 
    Gain  
    The amount an amplifier boosts the wireless signal   
    Gateway  
    A device that connects your network to another, like the internet   
    Gbps  
    Gigabits per second   
    Gigabit Ethernet   
    Transmission technology that provides a data rate of 1 billion bits per second   
    GUI  
    Graphical user interface   
    H 
    H.323   
    						
    							89 
    A standard that provides consistency of voice and video transmissions and compatibility for 
    videoconferencing devices   
    Half-duplex  
    Data cannot be transmitted and received at the same time   
    Hashing  
    Transforming a string of characters into a shorter string with a predefined length   
    Hexadecimal  
    Characters 0-9 and A-F   
    Hop  
    The action of data packets being transmitted from one router to another   
    Host  
    Computer on a network   
    HTTP  
    Hypertext Transfer Protocol is used to transfer files from HTTP servers (web servers) to HTTP 
    clients (web browsers)   
    HTTPS  
    HTTP over SSL is used to encrypt and decrypt HTTP transmissions   
    Hub  
    A networking device that connects multiple devices together   
    I 
    ICMP  
    Internet Control Message Protocol   
    IEEE  
    Institute of Electrical and Electronics Engineers   
    IGMP  
    Internet Group Management Protocol is used to make sure that computers can report their 
    multicast group membership to adjacent routers   
    IIS  
    Internet Information Server is a WEB server and FTP server provided by Microsoft   
    IKE  
    Internet Key Exchange is used to ensure security for VPN connections    
    						
    							90 
    Infrastructure  
    In terms of a wireless network, this is when wireless clients use an Access Point to gain access 
    to the network   
    Internet  
    A system of worldwide networks which use TCP/IP to allow for resources to be accessed from 
    computers around the world   
    Internet Explorer   
    A World Wide Web browser created and provided by Microsoft   
    Internet Protocol   
    The method of transferring data from one computer to another on the Internet   
    Internet Protocol Security   
    IPsec provides security at the packet processing layer of network communication   
    Internet Service Provider   
    An ISP provides access to the Internet to individuals or companies   
    Intranet  
    A private network   
    Intrusion Detection   
    A type of security that scans a network to detect attacks coming from inside and outside of the 
    network  
    IP  
    Internet Protocol   
    IP address   
    A 32-bit number, when talking about Internet Protocol Version 4, that identifies each computer 
    that transmits data on the Internet or on an Intranet   
    IPsec  
    Internet Protocol Security   
    IPX  
    Internetwork Packet Exchange is a networking protocol developed by Novel to enable their 
    Netware clients and servers to communicate   
    ISP  
    Internet Service Provider   
    J  
    						
    							91 
    Java  
    A programming language used to create programs and applets for web pages   
    K 
    Kbps  
    Kilobits per second   
    Kbyte  
    Kilobyte  
    L 
    LAN  
    Local Area Network   
    Latency  
    The amount of time that it takes a packet to get from the one point to another on a network. 
    Also referred to as delay   
    LED  
    Light Emitting Diode   
    Legacy  
    Older devices or technology   
    Local Area Network   
    A group of computers in a building that usually access files from a server   
    LPR/LPD  
    Line Printer Requestor/Line Printer Daemon. A TCP/IP protocol for transmitting streams of 
    printer data.   
    L2TP  
    Layer 2 Tunneling Protocol   
    M 
    MAC address   
    A unique hardware ID assigned to every Ethernet adapter by the manufacturer.   
    Mbps  
    Megabits per second   
    MDI  
    Medium Dependent Interface is an Ethernet port for a connection to a straight-through cable    
    						
    							92 
    MDIX  
    Medium Dependent Interface Crossover, is an Ethernet port for a connection to a crossover 
    cable  
    MIB  
    Management Information Base is a set of objects that can be managed by using SNMP   
    Modem  
    A device that Modulates digital signals from a computer to an analog signal in order to transmit 
    the signal over phone lines. It also Demodulates the analog signals coming from the phone 
    lines to digital signals for your computer   
    MPPE  
    Microsoft Point-to-Point Encryption is used to secure data transmissions over PPTP 
    connections  
    MTU  
    Maximum Transmission Unit is the largest packet that can be transmitted on a packet-based 
    network like the Internet   
    Multicast  
    Sending data from one device to many devices on a network   
    N 
    NAT  
    Network Address Translation allows many private IP addresses to connect to the Internet, or 
    another network, through one IP address   
    NetBEUI  
    NetBIOS Extended User Interface is a Local Area Network communication protocol. This is an 
    updated version of NetBIOS   
    NetBIOS  
    Network Basic Input/Output System   
    Netmask  
    Determines what portion of an IP address designates the Network and which part designates 
    the Host   
    Network Interface Card   
    A card installed in a computer or built onto the motherboard that allows the computer to 
    connect to a network   
    Network Layer   
    The third layer of the OSI model which handles the routing of traffic on a network    
    						
    							93 
    Network Time Protocol   
    Used to synchronize the time of all the computers in a network   
    NIC  
    Network Interface Card   
    NTP  
    Network Time Protocol   
    O 
    OFDM  
    Orthogonal Frequency-Division Multiplexing is the modulation technique for both 802.11a and 
    802.11g  
    OSI  
    Open Systems Interconnection is the reference model for how data should travel between two 
    devices on a network   
    OSPF  
    Open Shortest Path First is a routing protocol that is used more than RIP in larger scale 
    networks because only changes to the routing table are sent to all the other routers in the 
    network as opposed to sending the entire routing table at a regular interval, which is how RIP 
    functions  
    P 
    Password  
    A sequence of characters that is used to authenticate requests to resources on a network   
    Personal Area Network   
    The interconnection of networking devices within a range of 10 meters   
    Physical layer   
    The first layer of the OSI model. Provides the hardware means of transmitting electrical signals 
    on a data carrier   
    Ping  
    A utility program that verifies that a given Internet address exists and can receive messages. 
    The utility sends a control packet to the given address and waits for a response.   
    PoE  
    Power over Ethernet is the means of transmitting electricity over the unused pairs in a category 
    5 Ethernet cable   
    POP3  
    Post Office Protocol 3 is used for receiving email    
    						
    							94 
    Port  
    A logical channel endpoint in a network. A computer might have only one physical channel (its 
    Ethernet channel) but can have multiple ports (logical channels) each identified by a number.   
    PPP  
    Point-to-Point Protocol is used for two computers to communicate with each over a serial 
    interface, like a phone line   
    PPPoE  
    Point-to-Point Protocol over Ethernet is used to connect multiple computers to a remote server 
    over Ethernet   
    PPTP  
    Point-to-Point Tunneling Protocol is used for creating VPN tunnels over the Internet between 
    two networks   
    Preamble  
    Used to synchronize communication timing between devices on a network   
    Q 
    QoS  
    Quality of Service   
    R 
    RADIUS  
    Remote Authentication Dial-In User Service allows for remote users to dial into a central server 
    and be authenticated in order to access resources on a network   
    Reboot  
    To restart a computer and reload its operating software or firmware from nonvolatile storage.   
    Rendezvous  
    Apples version of UPnP, which allows for devices on a network to discover each other and be 
    connected without the need to configure any settings   
    Repeater  
    Retransmits the signal of an Access Point in order to extend its coverage   
    RIP  
    Routing Information Protocol is used to synchronize the routing table of all the routers on a 
    network  
    RJ-11  
    The most commonly used connection method for telephones    
    						
    							95 
    RJ-45  
    The most commonly used connection method for Ethernet   
    RS-232C  
    The interface for serial communication between computers and other related devices   
    RSA  
    Algorithm used for encryption and authentication   
    S 
    Server  
    A computer on a network that provides services and resources to other computers on the 
    network  
    Session key   
    An encryption and decryption key that is generated for every communication session between 
    two computers   
    Session layer   
    The fifth layer of the OSI model which coordinates the connection and communication between 
    applications on both ends   
    Simple Mail Transfer Protocol   
    Used for sending and receiving email   
    Simple Network Management Protocol   
    Governs the management and monitoring of network devices   
    SIP  
    Session Initiation Protocol. A standard protocol for initiating a user session that involves 
    multimedia content, such as voice or chat.   
    SMTP  
    Simple Mail Transfer Protocol   
    SNMP  
    Simple Network Management Protocol   
    SOHO  
    Small Office/Home Office   
    SPI  
    Stateful Packet Inspection   
    SSH   
    						
    							96 
    Secure Shell is a command line interface that allows for secure connections to remote 
    computers  
    SSID  
    Service Set Identifier is a name for a wireless network   
    Stateful inspection   
    A feature of a firewall that monitors outgoing and incoming traffic to make sure that only valid 
    responses to outgoing requests are allowed to pass though the firewall   
    Subnet mask   
    Determines what portion of an IP address designates the Network and which part designates 
    the Host   
    Syslog  
    System Logger -- a distributed logging interface for collecting in one place the logs from 
    different sources. Originally written for UNIX, it is now available for other operating systems, 
    including Windows.   
    T 
    TCP  
    Transmission Control Protocol   
    TCP/IP  
    Transmission Control Protocol/Internet Protocol   
    TCP Raw   
    A TCP/IP protocol for transmitting streams of printer data.   
    TFTP  
    Trivial File Transfer Protocol is a utility used for transferring files that is simpler to use than FTP 
    but with less features   
    Throughput  
    The amount of data that can be transferred in a given time period   
    Traceroute  
    A utility displays the routes between you computer and specific destination   
    U 
    UDP  
    User Datagram Protocol   
    Unicast  
    Communication between a single sender and receiver    
    						
    							97 
    Universal Plug and Play   
    A standard that allows network devices to discover each other and configure themselves to be 
    a part of the network   
    Upgrade  
    To install a more recent version of a software or firmware product   
    Upload  
    To send a request from one computer to another and have a file transmitted from the 
    requesting computer to the other   
    UPnP  
    Universal Plug and Play   
    URL  
    Uniform Resource Locator is a unique address for files accessible on the Internet   
    USB  
    Universal Serial Bus   
    UTP  
    Unshielded Twisted Pair   
    V 
    Virtual Private Network   
    VPN: A secure tunnel over the Internet to connect remote offices or users to their companys 
    network  
    VLAN  
    Virtual LAN   
    Voice over IP   
    Sending voice information over the Internet as opposed to the PSTN   
    VoIP  
    Voice over IP   
    W 
    Wake on LAN   
    Allows you to power up a computer though its Network Interface Card   
    WAN  
    Wide Area Network   
    WCN   
    						
    All SMC Networks manuals Comments (0)

    Related Manuals for SMC Networks Router SMCWBR14-N User Manual